QUESTION 21Refer to the exhibit. What type of network communication is depicted?

A. 802 3 frameB. TCP packetC. UDP packetD. Ethernet frame

Answer: D

QUESTION 22What is the maximum distance that is supported by Cisco passive Twinax cables?

A. 5mB. 3mC. 4mD. 10m

Answer: A

QUESTION 23What two technologies can be used to connect to storage arrays on a converged Ethernet IP network? (Choose two.)

A. FCoEB. Fiber ChannelC. iSCSID. InfinBandE. FabricPath

Answer: AC

QUESTION 24Which situation will cause a switch to flood traffic out all of the ports on the switch?

A. The switch receives a destination MAC address of 0000.0000.0000B. The switch receives a destination MAC address of ffff.ffff.ffffC. The switch receives a source MAC address of 0000.0000.0000D. The switch’s TCAM reaches the MAC address limit.E. The switch was configured in cut-through mode.

Answer: B

QUESTION 25What layer of the OSI Model provides the logical addressing that routers use for path determination?

A. transportB. networkC. applicationD. presentation

Answer: B

QUESTION 26What are three features of the IPv6 protocol? (Choose three.)

QUESTION 27Which table in a switch must be populated with forwarding information as to reduce Layer 2 flooding in the network?

A. MAC tableB. forwarding tableC. ARP tableD. routing table

Answer: A

QUESTION 28A network engineer proposes that old hubs be replaced by new Layer 2 switches in the company network. Which three are reasons for this proposal? (Choose three.)

A. Each port on a switch becomes its own collision domain.B. Layer 2 switches provide IP routing at line card speed.C. Hubs create one large collision domain and one large broadcast domain, which greatly decreasing network performance.D. Switches create one large collision domain and one large broadcast domain, which greatly increases network performance.E. By connecting each device directly to a port on the hub, each port on a switch becomes its own broadcast domain.F. Data transmission is faster on switches because switches work at line card speed.

Answer: ACF

QUESTION 29To improve security, a network engineer needs to configure an access list on a router. In which mode can this list be configured?